WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-changelog

[Xen-changelog] [xen-unstable] x86: suppress SYSCALL feature for 32on64

To: xen-changelog@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-changelog] [xen-unstable] x86: suppress SYSCALL feature for 32on64 guests
From: Xen patchbot-unstable <patchbot-unstable@xxxxxxxxxxxxxxxxxxx>
Date: Tue, 15 May 2007 08:21:30 -0700
Delivery-date: Tue, 15 May 2007 08:23:39 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-changelog-request@lists.xensource.com?subject=help>
List-id: BK change log <xen-changelog.lists.xensource.com>
List-post: <mailto:xen-changelog@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-changelog>, <mailto:xen-changelog-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-changelog>, <mailto:xen-changelog-request@lists.xensource.com?subject=unsubscribe>
Reply-to: xen-devel@xxxxxxxxxxxxxxxxxxx
Sender: xen-changelog-bounces@xxxxxxxxxxxxxxxxxxx
# HG changeset patch
# User kfraser@xxxxxxxxxxxxxxxxxxxxx
# Date 1179219267 -3600
# Node ID 75b4c7cb007dd4cdf30321c4fbd2e67e885628c3
# Parent  a605044ecb33f64e19de95ed9a56cafea8a68a26
x86: suppress SYSCALL feature for 32on64 guests
since Xen cannot handle it.

Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
---
 xen/arch/x86/traps.c |    2 ++
 1 files changed, 2 insertions(+)

diff -r a605044ecb33 -r 75b4c7cb007d xen/arch/x86/traps.c
--- a/xen/arch/x86/traps.c      Tue May 15 09:50:36 2007 +0100
+++ b/xen/arch/x86/traps.c      Tue May 15 09:54:27 2007 +0100
@@ -597,6 +597,8 @@ static int emulate_forced_invalid_op(str
     else if ( regs->eax == 0x80000001 )
     {
         /* Modify Feature Information. */
+        if ( is_pv_32bit_vcpu(current) )
+            clear_bit(X86_FEATURE_SYSCALL % 32, &d);
         clear_bit(X86_FEATURE_RDTSCP % 32, &d);
     }
     else

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-changelog] [xen-unstable] x86: suppress SYSCALL feature for 32on64 guests, Xen patchbot-unstable <=